Dec 14, 2023NewsroomCybercrime / Threat intelligence Microsoft on Wednesday said it obtained a court order to seize infrastructure set up by a...
Category: Attack
Dec 13, 2023NewsroomCyber Threat / Phishing Attack The threat actors behind the BazaCall call back phishing attacks have been observed leverag...
Dec 13, 2023NewsroomMobile Communication / Firmware security Google is highlighting the role played by Clang sanitizers in hardening the secur...
Malware analysis encompasses a broad range of activities, including examining the malware's network traffic. To be effective at it, it's crucial...
Dec 13, 2023NewsroomCryptocurrency / Threat Analysis Microsoft has warned that adversaries are using OAuth applications as an automation tool ...
Dec 13, 2023NewsroomCyber Attack / Geopolitics Ukraine's biggest telecom operator Kyivstar has become the victim of a cyber attack, disrupting...
Dec 13, 2023NewsroomPatch Tuesday / Windows Security Microsoft released its final set of Patch Tuesday updates for 2023, closing out 33 flaws ...
Let's begin with a thought-provoking question: among a credit card number, a social security number, and an Electronic Health Record (EHR), whic...
Dec 12, 2023NewsroomCyber Espionage / Malware The Russian nation-state threat actor known as APT28 has been observed making use of lures relat...
Dec 12, 2023The Hacker NewsCybersecurity / GenAI Security 2023 has seen its fair share of cyber attacks, however there's one attack vector tha...